Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是一个针对Open VSX Registry的供应链攻击事件。攻击者利用合法开发者的资源发布了包含GlassWorm恶意软件的更新。四个扩展被恶意版本取代,下载量超过22,000次。恶意软件用于窃取敏感信息,包括浏览器数据、加密货币钱包、iCloud钥匙串等。攻击者还避免在俄语环境中触发恶意软件,这可能与他们规避国内法律有关。 接下来,我需要将这些要点浓缩到100字以内。确保涵盖攻击目标、影响、恶意软件功能以及攻击手法的特点。 最后,检查语言是否简洁明了,没有使用用户要求的特定开头词。 </think> 研究人员披露了一起针对Open VSX Registry的供应链攻击事件,攻击者利用合法开发者资源发布恶意更新。四个常用扩展被植入GlassWorm恶意软件加载器,窃取浏览器数据、加密货币钱包信息及开发者凭证。攻击者避免在俄语环境中触发恶意行为,并利用加密技术隐藏执行过程。 2026-2-2 05:4:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Developer Tools / Malware

Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users.

"On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm malware loader," Socket security researcher Kirill Boychenko said in a Saturday report.

"These extensions had previously been presented as legitimate developer utilities (some first published more than two years ago) and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases."

The supply chain security company said that the supply chain attack involved the compromise of the developer's publishing credentials, with the Open VSX security team assessing the incident as involving the use of either a leaked token or other unauthorized access. The malicious versions have since been removed from the Open VSX.

Cybersecurity

The list of identified extensions is below -

  • FTP/SFTP/SSH Sync Tool (oorzc.ssh-tools — version 0.5.1)
  • I18n Tools (oorzc.i18n-tools-plus — version 1.6.8)
  • vscode mindmap (oorzc.mind-map — version 1.0.61)
  • scss to css (oorzc.scss-to-css-compile — version 1.3.4)

The poisoned versions, Socket noted, are designed to deliver a loader malware associated with a known campaign called GlassWorm. The loader is equipped to decrypt and run embedded at runtime, uses an increasingly weaponized technique called EtherHiding to fetch command-and-control (C2) endpoints, and ultimately run code designed to steal Apple macOS credentials and cryptocurrency wallet data.

At the same time, the malware is detonated only after the compromised machine has been profiled, and it has been determined that it does not correspond to a Russian locale, a pattern commonly observed in malicious programs originating from or affiliated with Russian-speaking threat actors to avoid domestic prosecution.

The kinds of information harvested by the malware include -

  • Data from Mozilla Firefox and Chromium-based browsers (logins, cookies, internet history, and wallet extensions like MetaMask)
  • Cryptocurrency wallet files (Electrum, Exodus, Atomic, Ledger Live, Trezor Suite, Binance, and TonKeeper)
  • iCloud Keychain database
  • Safari cookies
  • Data from Apple Notes
  • user documents from Desktop, Documents, and Downloads folders
  • FortiClient VPN configuration files
  • Developer credentials (e.g., ~/.aws and ~/.ssh)

The targeting of developer information poses severe risks as it exposes enterprise environments to potential cloud account compromise and lateral movement attacks.

Cybersecurity

"The payload includes routines to locate and extract authentication material used in common workflows, including inspecting npm configuration for _authToken and referencing GitHub authentication artifacts, which can provide access to private repositories, CI secrets, and release automation," Boychenko said.

A significant aspect of the attack is that it diverges from previously observed GlassWorm indicators in that it makes use of a compromised account belonging to a legitimate developer to distribute the malware. In prior instances, the threat actors behind the campaign have leveraged typosquatting and brandjacking to upload fraudulent extensions for subsequent propagation.

"The threat actor blends into normal developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and uses Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions," Socket said. "These design choices reduce the value of static indicators and shift defender advantage toward behavioral detection and rapid response."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html
如有侵权请联系:admin#unsafe.sh